With the continuous downscaling of semiconductor processes, the growing power density and thermal issues in multicore processors become more and more challenging, thus reliable dynamic thermal management (DTM) is required to prevent severe challenges in system performance. The accuracy of the thermal profile, delivered to the DTM manager, plays a critical role in the efficiency and reliability of DTM, different sources of noise and variations in deep submicron (DSM) technologies severely affecting the thermal data that can lead to significant degradation of DTM performance. In this article, we propose a novel fault-tolerance scheme exploiting approximate computing to mitigate the DSM effects on DTM efficiency. Approximate computing in hardware design can lead to significant gains in energy efficiency, area, and performance. To exploit this opportunity, there is a need for design abstractions that can systematically incorporate approximation in hardware design which is the main contribution of our work. Our proposed scheme achieves 11.20% lower power consumption, 6.59% smaller area, and 12% reduction in the number of wires, while increasing DTM efficiency by 5.24%.
MB Mahmood, BN Dhannoon
The effect of operating parameters on the batch scale separation of hydrocarbon mixture (benzene and hexane) using
emulsion liquid membrane technique is reported. Sparkleen detergent was used as surfactant and heavy mineral oil as
solvent to receive the permeates.
From the experimental results, the parameters that influenced the permeation are, composition of feed, contact time
with solvent, ratio of volume of solvent to volume of hydrocarbon feed, ratio of volume of surfactant solution to volume
of hydrocarbon feed, surfactant concentration, mixing intensity and glycerol as polar additive in the surfactant solution
to eliminate drop breakup.
The best conditions for the separation in this study were found to be: comp
Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreThe aesthetic dimension in popular subjects is one of the important topics in the history and culture of peoples, as it is the vessel from which their faith, traditions, original values, language, ideas, practices and way of life are derived, which expresses their culture and national identity, and it is the bridge of communication between generations throughout the ages.
It is one of the main pillars in the process of development and development, and popular subjects have special images related to real daily life, and they are the best source for man to narrate through him in his portrayal of daily life in general, and for the artist in particular, who is part of this daily life and its vocabulary, as he interacts with it so that
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More